Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-31804: n/a

0
Medium
VulnerabilityCVE-2024-31804cvecve-2024-31804
Published: Tue Apr 23 2024 (04/23/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An unquoted service path vulnerability in Terratec DMX_6Fire USB v.1.23.0.02 allows a local attacker to escalate privileges via the Program.exe component.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 16:28:00 UTC

Technical Analysis

CVE-2024-31804 is an unquoted service path vulnerability affecting the Terratec DMX_6Fire USB driver version 1.23.0.02. The vulnerability stems from the way Windows services handle executable paths that contain spaces but are not enclosed in quotation marks. When the service path is unquoted, Windows may interpret the path incorrectly and search for executables in unintended directories. A local attacker with existing high privileges can exploit this by placing a malicious executable named to match a portion of the service path in a directory that Windows searches first. When the service starts or restarts, the malicious executable is run with elevated privileges, allowing privilege escalation. The affected component is Program.exe, which is part of the Terratec driver package. The vulnerability is classified under CWE-428, which relates to unquoted search paths leading to potential execution of unintended binaries. The CVSS 3.1 score of 6.7 reflects the medium severity, considering the attack vector is local, requires high privileges, but can lead to full confidentiality, integrity, and availability compromise. No patches or updates have been released at the time of publication, and no public exploits are known. This vulnerability primarily affects Windows systems running the specific Terratec driver version.

Potential Impact

The primary impact of CVE-2024-31804 is local privilege escalation on affected Windows systems. An attacker who already has high-level local access can leverage this vulnerability to gain SYSTEM-level privileges, effectively taking full control of the affected machine. This can lead to unauthorized access to sensitive data, installation of persistent malware, disabling of security controls, and disruption of system availability. For organizations, this could mean compromised endpoints, lateral movement within networks, and potential data breaches. Although exploitation requires local access and elevated privileges, the ability to escalate privileges further increases the risk posed by insider threats or attackers who have gained limited foothold. The absence of known exploits in the wild reduces immediate risk, but the lack of patches means the vulnerability remains exploitable if discovered by attackers. The impact is especially critical in environments where Terratec DMX_6Fire USB devices are widely used, such as audio production studios or professional multimedia setups.

Mitigation Recommendations

To mitigate CVE-2024-31804, organizations should first identify all systems running the affected Terratec DMX_6Fire USB driver version 1.23.0.02. Since no official patch is currently available, immediate mitigation involves manually correcting the unquoted service path. This can be done by locating the service executable path in the Windows Registry or service configuration and enclosing the entire path in quotation marks to prevent path hijacking. Additionally, restrict write permissions on directories in the service path to prevent unauthorized users from placing malicious executables. Employ application whitelisting to block unauthorized binaries from executing. Monitor systems for unusual service restarts or unexpected executables running with elevated privileges. Limit local administrative access to trusted personnel only and enforce the principle of least privilege to reduce the risk of exploitation. Stay alert for vendor updates or patches and apply them promptly once available. Consider using endpoint detection and response (EDR) tools to detect suspicious activity related to service execution.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-04-05T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6dd6b7ef31ef0b58f65b

Added to database: 2/25/2026, 9:47:02 PM

Last enriched: 2/26/2026, 4:28:00 PM

Last updated: 4/12/2026, 3:41:11 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses